Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical SharePoint Flaw Exploited in Cyber Attacks

Critical SharePoint Flaw Exploited in Cyber Attacks

Posted on March 19, 2026 By CWS

A significant security vulnerability in Microsoft SharePoint has been identified and is currently being exploited in active cyber attacks. On March 18, 2026, this flaw was officially included in the Known Exploited Vulnerabilities (KEV) catalog by the Cybersecurity and Infrastructure Security Agency (CISA), underscoring the urgency for network administrators to act swiftly.

Understanding the SharePoint Vulnerability

The vulnerability, cataloged as CVE-2026-20963, arises from the manner in which Microsoft SharePoint handles the deserialization of untrusted data. Deserialization is the conversion process that transforms data meant for storage or network transfer into executable objects within an application. When this process is not securely handled, it opens the door for attackers to exploit the system.

This specific flaw allows an unauthorized, remote attacker to send a maliciously crafted data packet to a vulnerable server, which, when processed by SharePoint, executes the attacker’s embedded instructions. This capability to execute arbitrary code on the host system without valid credentials poses a severe risk, particularly as SharePoint environments often contain sensitive corporate information.

Implications and Threat Landscape

The addition of CVE-2026-20963 to the KEV catalog highlights the observed exploitation of this vulnerability in real-world scenarios, although the exact advanced persistent threat (APT) groups responsible remain unidentified. While the link to active ransomware campaigns has not been confirmed, vulnerabilities allowing remote code execution are highly sought after by threat actors.

Once attackers achieve code execution, they can deploy additional payloads, maintain persistent access, and potentially move laterally within the network, escalating the threat to corporate data and communications security.

Mitigation and Recommendations

CISA has issued a directive for Federal Civilian Executive Branch (FCEB) agencies under Binding Operational Directive (BOD) 22-01, mandating the remediation of all vulnerable SharePoint instances by March 21, 2026. Private organizations are advised to follow this timeline to safeguard their systems.

Administrators should immediately review Microsoft’s security advisories and apply all available patches. If patching is not feasible, alternative mitigations must be implemented. In the absence of viable mitigations, CISA recommends discontinuing the use of affected products until a lasting solution is available.

Stay informed by following us on Google News, LinkedIn, and X for ongoing cybersecurity updates. Contact us to share your cybersecurity stories.

Cyber Security News Tags:APT groups, CISA, CVE-2026-20963, Cybersecurity, data breach, federal agencies, Microsoft, network security, Ransomware, risk mitigation, security patch, SharePoint, Vulnerability

Post navigation

Previous Post: WaterPlum’s New Malware Threatens VSCode Security
Next Post: Cisco Firewall Flaw Exploited in Ransomware Attacks

Related Posts

What You Need to Pay Attention to Right Now  What You Need to Pay Attention to Right Now  Cyber Security News
5,219 PLCs at Risk from Iranian Cyber Threats, Censys Reports 5,219 PLCs at Risk from Iranian Cyber Threats, Censys Reports Cyber Security News
Ivanti DSM Vulnerability: Critical Security Update Released Ivanti DSM Vulnerability: Critical Security Update Released Cyber Security News
Hidden Malware in Open VSX Extension Threatens Developers Hidden Malware in Open VSX Extension Threatens Developers Cyber Security News
OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data OPPO Clone Phone Weak WiFi Hotspot Exposes Sensitive Data Cyber Security News
Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums Threat Actors Allegedly Selling Microsoft Office 0-Day RCE Vulnerability on Hacking Forums Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Defender Misidentifies DigiCert Certificates
  • Pentagon Partners with Tech Giants for AI in Defense
  • CISA Highlights Critical Linux Vulnerability Exploitation
  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Defender Misidentifies DigiCert Certificates
  • Pentagon Partners with Tech Giants for AI in Defense
  • CISA Highlights Critical Linux Vulnerability Exploitation
  • Government Servers Compromised Through cPanel Vulnerability
  • Trellix Faces Security Breach in Source Code Repository

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark